The emerging threat of ai-driven cyber attacks: A review
Cyberattacks are becoming more sophisticated and ubiquitous. Cybercriminals are
inevitably adopting Artificial Intelligence (AI) techniques to evade the cyberspace and cause …
inevitably adopting Artificial Intelligence (AI) techniques to evade the cyberspace and cause …
Artificial intelligence, cyber-threats and Industry 4.0: Challenges and opportunities
This survey paper discusses opportunities and threats of using artificial intelligence (AI)
technology in the manufacturing sector with consideration for offensive and defensive uses …
technology in the manufacturing sector with consideration for offensive and defensive uses …
Trustworthy LLMs: A survey and guideline for evaluating large language models' alignment
Ensuring alignment, which refers to making models behave in accordance with human
intentions [1, 2], has become a critical task before deploying large language models (LLMs) …
intentions [1, 2], has become a critical task before deploying large language models (LLMs) …
The secret sharer: Evaluating and testing unintended memorization in neural networks
This paper describes a testing methodology for quantitatively assessing the risk that rare or
unique training-data sequences are unintentionally memorized by generative sequence …
unique training-data sequences are unintentionally memorized by generative sequence …
A comprehensive survey of recent internet measurement techniques for cyber security
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …
vulnerable to its security flaws. Despite substantial efforts to address many of these …
The ai-based cyber threat landscape: A survey
Recent advancements in artificial intelligence (AI) technologies have induced tremendous
growth in innovation and automation. Although these AI technologies offer significant …
growth in innovation and automation. Although these AI technologies offer significant …
False information on web and social media: A survey
False information can be created and spread easily through the web and social media
platforms, resulting in widespread real-world impact. Characterizing how false information …
platforms, resulting in widespread real-world impact. Characterizing how false information …
{Updates-Leak}: Data set inference and reconstruction attacks in online learning
Machine learning (ML) has progressed rapidly during the past decade and the major factor
that drives such development is the unprecedented large-scale data. As data generation is a …
that drives such development is the unprecedented large-scale data. As data generation is a …
Unpacking the social media bot: A typology to guide research and policy
Amid widespread reports of digital influence operations during major elections,
policymakers, scholars, and journalists have become increasingly interested in the political …
policymakers, scholars, and journalists have become increasingly interested in the political …
Deepfake text detection: Limitations and opportunities
Recent advances in generative models for language have enabled the creation of
convincing synthetic text or deepfake text. Prior work has demonstrated the potential for …
convincing synthetic text or deepfake text. Prior work has demonstrated the potential for …